Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 04:20

General

  • Target

    0e46eaade1185b82cfb62065dbe99661.exe

  • Size

    404KB

  • MD5

    0e46eaade1185b82cfb62065dbe99661

  • SHA1

    2dc44f429d5ca19d5ae9a3c8429ea59260fbec59

  • SHA256

    a832f0135ddc63582b47bffe231a3d480fabb0f84e692af475e8bcaf61cb4199

  • SHA512

    09ba5131a0b5290efef3f3c258fff2df4e7cbd2533012d61f3ef0fc4cadc17c86f6fcd220b80bec257e487c3aeabf347e6d1dc98c19ae5c2ca5b7cd6d86388b9

  • SSDEEP

    12288:LvnFEDFqkRopm7SbPENR7wCRqzbm4tj8G:RED0kRogG7kfMzqqjd

Malware Config

Extracted

Family

metasploit

Version

encoder/fnstenv_mov

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Deletes itself 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e46eaade1185b82cfb62065dbe99661.exe
    "C:\Users\Admin\AppData\Local\Temp\0e46eaade1185b82cfb62065dbe99661.exe"
    1⤵
    • Identifies Wine through registry keys
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\0E46EA~1.EXE > NUL
      2⤵
      • Deletes itself
      PID:2916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2020-0-0x0000000000400000-0x00000000004F0000-memory.dmp

    Filesize

    960KB

  • memory/2020-7-0x0000000003CC0000-0x0000000003CC1000-memory.dmp

    Filesize

    4KB

  • memory/2020-6-0x0000000003C10000-0x0000000003C11000-memory.dmp

    Filesize

    4KB

  • memory/2020-5-0x0000000003C40000-0x0000000003C41000-memory.dmp

    Filesize

    4KB

  • memory/2020-4-0x0000000003B60000-0x0000000003B61000-memory.dmp

    Filesize

    4KB

  • memory/2020-3-0x0000000003B50000-0x0000000003B51000-memory.dmp

    Filesize

    4KB

  • memory/2020-2-0x0000000003BF0000-0x0000000003BF1000-memory.dmp

    Filesize

    4KB

  • memory/2020-1-0x0000000000400000-0x00000000004F0000-memory.dmp

    Filesize

    960KB

  • memory/2020-8-0x0000000003CD0000-0x0000000003CD1000-memory.dmp

    Filesize

    4KB

  • memory/2020-9-0x0000000003C20000-0x0000000003C21000-memory.dmp

    Filesize

    4KB

  • memory/2020-10-0x0000000000400000-0x00000000004F0000-memory.dmp

    Filesize

    960KB